crowdstrike/ioc Dashboards

  • Domain overview

    The Domain Overview dashboard provides comprehensive domain-based threat analysis through detailed monitoring visualizations. This dashboard enables tracking of suspicious domains, investigation of domain-based threats, and monitoring of domain activity patterns across the network infrastructure.

  • IP overview

    The IP Overview dashboard presents comprehensive IP-based threat intelligence through detailed analysis visualizations. This dashboard enables monitoring of suspicious IP addresses, tracking of malicious network activities, and investigation of IP-based security events across the environment.

  • Overview

    The Overview dashboard provides a consolidated view of threat indicators through comprehensive security visualizations. This dashboard enables monitoring of various threat types, analysis of security trends, and tracking of indicator patterns across the security landscape.

  • URL overview

    The URL Overview dashboard presents detailed URL-based threat analysis through specialized monitoring visualizations. This dashboard enables tracking of malicious URLs, investigation of web-based threats, and monitoring of suspicious web activity patterns across the network.

Domain overview

The Domain Overview dashboard provides comprehensive domain-based threat analysis through detailed monitoring visualizations. This dashboard enables tracking of suspicious domains, investigation of domain-based threats, and monitoring of domain activity patterns across the network infrastructure.

WidgetDescriptionType
IOC geolocation Location of client IP addresses present in IOC. Note - location of client IP does not always correlate with actual physical location of user or system

Hide Query

Show Query

World Map
Threat types Pie chart showing breakdown of threat types (linked to client IP)

Hide Query

Show Query

Pie Chart
Threat relationships Links client IP IOC labels to the different values of each label

Hide Query

Show Query

Sankey
Actors Pie chart showing breakdown of threat actors (linked to client IP)

Hide Query

Show Query

Pie Chart
Kill chains Pie chart showing breakdown of kill chain values (linked to client IP)

Hide Query

Show Query

Pie Chart
All threat details Detailed information of all threats found in client IPs

Hide Query

Show Query

Table
Malware Pie chart showing breakdown of malware types (linked to client IP)

Hide Query

Show Query

Pie Chart
note-1624965575450 # All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events Note
IP overview

The IP Overview dashboard presents comprehensive IP-based threat intelligence through detailed analysis visualizations. This dashboard enables monitoring of suspicious IP addresses, tracking of malicious network activities, and investigation of IP-based security events across the environment.

WidgetDescriptionType
IOC geolocation Location of client IP addresses present in IOC. Note - location of client IP does not always correlate with actual physical location of user or system

Hide Query

Show Query

World Map
Threat types Pie chart showing breakdown of threat types (linked to client IP)

Hide Query

Show Query

Pie Chart
Threat relationships Links client IP IOC labels to the different values of each label

Hide Query

Show Query

Sankey
Actors Pie chart showing breakdown of threat actors (linked to client IP)

Hide Query

Show Query

Pie Chart
Kill chains Pie chart showing breakdown of kill chain values (linked to client IP)

Hide Query

Show Query

Pie Chart
All threat details Detailed information of all threats found in client IPs

Hide Query

Show Query

Table
Malware Pie chart showing breakdown of malware types (linked to client IP)

Hide Query

Show Query

Pie Chart
note-1624965575450 # All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events Note
Overview

The Overview dashboard provides a consolidated view of threat indicators through comprehensive security visualizations. This dashboard enables monitoring of various threat types, analysis of security trends, and tracking of indicator patterns across the security landscape.

WidgetDescriptionType
Threat attributes Displays a flow chart of threat attributes based on URL, IP and domain data.

Hide Query

Show Query

Sankey
Threat severity over time Displays threat severity over time using URL, IP address, and domain.

Hide Query

Show Query

Time Chart
Threats by confidence Displays a list of threats by confidence level based on URLs, IP addresses, and domains.

Hide Query

Show Query

Pie Chart
Guide Please use these dashboards as inspiration on building your own security insights. To get started, edit the queries in the widget to insert the right field names you want to look up IOC matches on. Note
URL overview

The URL Overview dashboard presents detailed URL-based threat analysis through specialized monitoring visualizations. This dashboard enables tracking of malicious URLs, investigation of web-based threats, and monitoring of suspicious web activity patterns across the network.

WidgetDescriptionType
IOC geolocation Location of client IP addresses present in IOC. Note - location of client IP does not always correlate with actual physical location of user or system

Hide Query

Show Query

World Map
Threat types Pie chart showing breakdown of threat types (linked to client IP)

Hide Query

Show Query

Pie Chart
Threat relationships Links client IP IOC labels to the different values of each label

Hide Query

Show Query

Sankey
Actors Pie chart showing breakdown of threat actors (linked to client IP)

Hide Query

Show Query

Pie Chart
Kill chains Pie chart showing breakdown of kill chain values (linked to client IP)

Hide Query

Show Query

Pie Chart
All threat details Detailed information of all threats found in client IPs

Hide Query

Show Query

Table
Malware Pie chart showing breakdown of malware types (linked to client IP)

Hide Query

Show Query

Pie Chart
note-1624965575450 # All Details The table below shows details of all the threats found, irrespective of the threshold filter applied. Click on the various aspects of these results to drill down into the raw events Note